User’s Manual
398
IMAP
IMAP is an acronym for
I
nternet
M
essage
A
ccess
P
rotocol. It is a protocol for email clients to retrieve email messages
from a mail server.
IMAP is the protocol that IMAP clients use to communicate with the servers, and SMTP is the protocol used to
transport mail to an IMAP server.
The current version of the Internet Message Access Protocol is IMAP4. It is similar to Post Office Protocol version 3
(POP3), but offers additional and more complex features. For example, the IMAP4 protocol leaves your email
messages on the server rather than downloading them to your computer. If you wish to remove your messages from
the server, you must use your mail client to generate local folders, copy messages to your local hard drive, and then
delete and expunge the messages from the server.
IP
IP is an acronym for
I
nternet
P
rotocol. It is a protocol used for communicating data across a internet network.
IP is a "best effort" system, which means that no packet of information sent over it is assured to reach its destination in
the same condition it was sent. Each device connected to a Local Area Network (LAN) or Wide Area Network (WAN) is
given an Internet Protocol address, and this IP address is used to identify the device uniquely among all other devices
connected to the extended network.
The current version of the Internet protocol is IPv4, which has 32-bits Internet Protocol addresses allowing for in
excess of four billion unique addresses. This number is reduced drastically by the practice of webmasters taking
addresses in large blocks, the bulk of which remain unused. There is a rather substantial movement to adopt a new
version of the Internet Protocol, IPv6, which would have 128-bits Internet Protocol addresses. This number can be
represented roughly by a three with thirty-nine zeroes after it. However, IPv4 is still the protocol of choice for most of
the Internet.
IPMC
IPMC is an acronym for
IP
M
ulti
C
ast.
IP Source Guard
IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic
based on the DHCP Snooping Table or manually configured IP Source Bindings. It helps prevent IP spoofing attacks
when a host tries to spoof and use the IP address of another host.
Содержание IGS-10020
Страница 1: ...User s Manual...
Страница 31: ...User s Manual 31 IGS 10020PT IGS 10020PT Dimensions W x D x H 72 x 107 x 152mm...
Страница 32: ...User s Manual 32 IGS 10020HPT IGS 10020HPT Dimensions W x D x H 72 x 107 x 152mm...
Страница 33: ...User s Manual 33 IGS 10080MFT IGS 10080MFT Dimensions W x D x H 72 x 107x 152mm...
Страница 34: ...User s Manual 34 IGS 12040MT IGS 12040MT Dimensions W x D x H 72 x 107 x 152mm...
Страница 35: ...User s Manual 35 IGS 20040MT IGS 20040MT Dimensions W x D x H 72 x 107 x 152mm...
Страница 36: ...User s Manual 36 IGS 20160HPT IGS 20160HPT Dimensions W x D x H 84 x 107 x 152mm...
Страница 46: ...User s Manual 46 Figure 2 16 IGS 10080MFT Upper Panel Figure 2 17 IGS 12040MT Upper Panel...
Страница 47: ...User s Manual 47 Figure 2 18 IGS 20040MT Upper Panel Figure 2 19 IGS 20160HPT Upper Panel...
Страница 181: ...User s Manual 181 Figure 4 8 2 Multicast Flooding Figure 4 8 3 IGMP Snooping Multicast Stream Control...